WhatsApp Oro, a new scam related to the world famous messaging app

whatsapp oro

 

Be careful! The Spanish National Police have reported a new type of scam related to WhatsApp. That’s right, another one! We’re beginning to lose count of how many times we’ve reported these types of stories.

It appears that cyber-criminals have invented a new version of the messaging app: WhatsApp Oro (WhatsApp Gold). As you can probably imagine, there is no ‘Gold’ version of WhatsApp, and it’s really just another fraud to subscribe you to Premium SMS services.

Seemingly, criminals have been advertising this service on Twitter and more than a few users have fallen for it.

As you know, the success of WhatsApp has made it a prime target for criminals, so take care and don’t fall into the trap!

The post WhatsApp Oro, a new scam related to the world famous messaging app appeared first on MediaCenter Panda Security.

Hacker Experience. The game about IT security caused a sensation on the Internet

A developer created a game that became an Internet sensation in just a few hours. Overwhelmed by the success of his work, he decided to sell it.

This is similar to what happened with Flappy Bird. Vietnamese game developer Dong Nguyen, decided to sell the famous app as soon as it became successful.

Yet in this case the game is not about birds and tubes, rather viruses and IT security. The game is called Hacker Experience and its creator, a computer science student at the University of Winnipeg, has been saturated by the response to this simulator.

hacker experience

I’m tired. So I’m selling my game that just went viral “. With these words, Renato Massaro, who is just 21 years old, has terminated his relation with ‘Hacker Experience’, the game he was working on for two-and-a-half years.

The game is a hacking simulator, where players can play the role of a cyber-criminal trying to become rich and powerful working for an evil corporation. In this game, you can hack virtual servers, develop new software, mine bitcoins, work on missions, hack banks, etc.

But it’s only a game; everything that happens is just a simulation, so players are not really handling viruses that could damage their computers or destroying the hardware on other people’s systems. It’s all a work of fiction, a simulator that you can play online and which became an incredible success within just a few hours.

“It went viral in a matter of minutes,” says Massaro, who goes on to explain how he launched ‘Hacker Experience‘ at 4pm on September 13 and, “…by the end of the day, it had 2000 registered users and 1000 online.”

This instant success was largely down to two news aggregators: Hacker News and Reddit who made the name of this game spread like wildfire and the number of users rocket in no time at all.

What this Brazilian student had been working on for so long, suddenly became a sensation. “Now, about 30 hours later, there are 6000 registered users and 1500+ online,” said Massaro, as he realized that the situation was simply too much for him.

hacker experience success

In just a few hours the situation had become unbearable for the young student having received thousands of emails and messages. Overwhelmed by the situation, the creator of the simulator decided to put ‘Hacker Experience’ up for sale.

What was the asking price? There wasn’t one. Massaro waited for offers via email. He was selling the game, the code and the NeoArt Labs brand, under which he had launched the game, but as he had never before sold software, he had no idea what price to put on his game.

He did however tell potential buyers that this was the result of more than two and a half years work and that ‘Hacker Experience’ was already a lucrative source of income.

hacker experience game

 

According to his calculations, revenue from Google AdSense and Premium account users (‘Hacker Experience’ is based around the ‘freemium’ model, where players pay for certain features that give them an advantage or make the game quicker) would offer a minimum return of $1000 (about 800 euros) a month. However, Massaro also claims that with a few adjustments and offering more advantages to Premium users, ‘Hacker Experience’ could soon be offering returns of up to $5000 (almost 4000 euros) per month.

Nevertheless, any potential buyer should also be aware the game’s users have already found flaws and have been sending them via email to the creator as well as publishing them on the Hacker Experience wikipedia page and forum.

The game is still operating, though probably it is now under new ownership. In exchange, the creator will have received a decent sum (according to his own calculations, Massaro suggests that a price of some 60,000 dollars for the game would be easily recovered within the space of one year) and above all he can now enjoy the peaceful life that was so rudely interrupted by ‘Hacker Experience‘, the virus game that went viral.

The post Hacker Experience. The game about IT security caused a sensation on the Internet appeared first on MediaCenter Panda Security.

Why There’s Room for RealPad

In my last blog, I discussed the current disconnect —or lag—with some seniors, especially older ones, when it comes to smartphone adoption.

As research by Pew and others has suggested, the reasons many older people have lagged in adoption of smartphones seems rooted in the footprint of the device, i.e. size of the user interface and thus ease of reading, viewing and manipulation.  This is evident in the rapid adoption of larger devices  like tablets and e-readers – by this demographic.

In recognition of the stumbling blocks for some seniors, earlier this month AARP launched its new RealPad tablet. The $189 device, produced in partnership with Intel, includes larger text and icons. But it also smartly packages all-hour tech support and video tutorials – tools designed expressly for seniors. And it comes preloaded with an AARP app, eBook reader, email (Gmail), photo sharing, video chat, games, tools and other features like a retirement and health calculators. Additional apps will be available on Google Play.

It’s basically a tablet—about the size of an iPad mini—that runs Google Android 4.4 with a custom app launcher featuring large icons.  AARP says the tablet is designed for anyone who is apprehensive about using tablets and embracing technology and going digital.

AARP specifically targets 70-million 50+-age group, who haven’t adopted tablet technology. But I think the sweet spot for this product really isn’t most Boomers, but older seniors – the generation born before 1946. As we’ve discussed before, many Boomers are plenty tech savvy – and I also would be remiss if I didn’t mention that some seniors I’ve come across are plenty tech savvy…but not all.

OK, so why should you consider it for or recommend it to the seniors in your life? I like the design concept and larger icons and readability, but more than that, I like the addition of its one-click RealQuick Fix troubleshooting feature and 24/7-tech support. (Amazon’s Kindle Fire HDX also offers 24/7 support).

In terms of security, AARP has also made a smart move: It allows, among other free downloads, “Protecting Yourself Online for Dummies.” As it says, “Don’t let news about Internet risks deter you from taking full advantage of its benefits.”

My previous post had some of our own safety suggestions for seniors. I’m not clear on AARP’s entire security offering. We at AVG offer strong security apps on the Android platform, check out our Google Play page.

Is the RealPad the right choice for everyone over the age of 50? Probably not. But it was designed with an older adult in mind who needs a little extra care – and I applaud that.

I agree with AARP, there’s just too much value in the digital world for seniors to be shut off.  Tablets and larger format smartphones can really enrich their lives. In addition to providing grandparents with a digital photo album of their grandkids and a social platform to stay connected with family and friends, it’s a ready-made platform and market for important things like health monitoring and management apps. RealPad is a great step in the right direction to address that need.

We should all be interested in addressing the needs of this market. After all, we are all likely to be seniors someday.

Cyber awareness month – stay safe online

Bad URLs can steal your identity, track your every movement, and violate your privacy. Bad URLs have been around for many years, and they are still wreaking havoc. It is exactly why you should always be careful where you click.

Clicking on an infected or bad URL has happened to millions across the globe in probably every country, and the reason people sometimes make the mistake of clicking something they shouldn’t is the very reason that the bad guys keep putting those bad URL’s in various places (websites, emails, pop up ads, etc.) to trick us. They keep doing it because we keep clicking where we shouldn’t.

This October we celebrated Cyber Awareness Month and Avira wants to make sure users don’t click on anything bad and end up on a website that is dangerous. Avira Browser Safety is a browser extension that ensures that when users browse various sites on the Internet, they don’t accidentally click on a bad URL.

Avira Browser Safety is browser extension which protects a user’s online privacy and blocks malicious websites before they load. Right now it’s available to Avira users for free.

If you don’t have browser security installed on your PC, please consider installing Avira Browser Security. It’s important to make sure you’re doing everything possible to remain safe while online, and set in motion good browsing habits that last throughout the year.

The post Cyber awareness month – stay safe online appeared first on Avira Blog.

Was your email hacked in recent data breaches?

In early September, reports of a massive Gmail password breach came to light across the globe. In all, there were up to 5 million stolen Gmail accounts and passwords and all were published on a Russian forum.

Luckily, many of the passwords do not match the Gmail accounts with which they are associated. Google announced that only 1 to 2 % of the passwords match and that it has secured those. It has also stated that its systems were not breached in any way. But, the damage is done and another breach has occurred.

It could be that passwords stolen from previous security breaches such as Adobe or LinkedIn happened to be the same ones that people used for Gmail and the hacker put together different data sets to come up with this list.

In mid-September, Russia’s largest email providers mail.ru and Yandex were hit by data breaches. Around 5 million mail.ru email accounts and 1 million Yandex email accounts were breached and passwords released on Russian forums. The companies said that their systems were not compromised and these accounts were stolen using phishing attacks. The analysis of these accounts showed that they were at least partially genuine.

In what seemed to be a busy month for hackers, JP Morgan Chase announced that over 76 million households in the US were affected by a breach that compromised personal contact information like addresses, email addresses and phone numbers.

No matter how many times breaches happen all over the globe, you can always check to see if your personal email address has been compromised. By downloading Avira’s Identity Safeguard to your mobile device, you can instantly scan the Avira database and check to see if you’re identity has been compromised. To check your email address, download the free Identity Safeguard app for Avira’s iOS or Android mobile apps.

The post Was your email hacked in recent data breaches? appeared first on Avira Blog.

UPDATED VMSA-2014-0010.8 – VMware product updates address critical Bash security vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

VMware Security Advisory

Advisory ID: VMSA-2014-0010.8
Synopsis:    VMware product updates address critical Bash 
             security vulnerabilities
Issue date:  2014-09-30
Updated on:  2014-10-06
CVE numbers: CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, 
             CVE-2014-7187, CVE-2014-6277, CVE-2014-6278
- ------------------------------------------------------------------------

1. Summary

   VMware product updates address Bash security vulnerabilities.

2. Relevant Releases (Affected products for which remediation is present)

   ESX 4.1 without patch ESX410-201410401-SG
   ESX 4.0 without patch ESX400-201410401-SG

   vCenter Server Appliance prior to 5.5 U2a
   vCenter Server Appliance prior to 5.1 U2b
   vCenter Server Appliance prior to 5.0 U3b
   Horizon DaaS Platform prior to 6.1.1
   Horizon DaaS Platform prior to 6.0.2
   Horizon DaaS Platform prior to 5.4.3
   Horizon Workspace 1.x, 2.x without patch
   IT Business Management Suite prior to 1.1.0
   IT Business Management Suite prior to 1.0.1
   NSX for Multi-Hypervisor 4.2.x prior to 4.2.1
   NSX for Multi-Hypervisor 4.1.x prior to 4.1.4
   NSX for Multi-Hypervisor 4.0.x prior to 4.0.5
   NSX for vSphere 6.1.x prior to 6.1.1
   NSX for vSphere 6.0.x prior to 6.0.7
   NVP 3.x prior to 3.2.4
   vCenter Hyperic Server prior to 5.8.3
   vCenter Hyperic Server 5.8.2 without SP3
   vCenter Hyperic Server 5.8.1 without SP3
   vCenter Hyperic Server 5.8.0 without SP2
   vCenter Hyperic Server prior to 5.7.2
   vCenter Hyperic Server 5.7.1 without SP1
   vCenter Hyperic Server prior to 5.0.3
   vCenter Hyperic Server 5.0.2 without SP1
   vCenter Infrastructure Navigator prior to 5.8.3
   vCenter Infrastructure Navigator prior to 5.7.1
   vCenter Infrastructure Navigator prior to 2.0.1
   vCenter Log Insight prior to 2.0U1
   vCenter Log Insight prior to 1.5.0U1
   vCenter Operations Manager 5.x without patch
   vCenter Orchestrator Appliance 5.5.x prior to 5.5.2.1
   vCenter Orchestrator Appliance 5.1.x, 4.x without patch
   vCenter Site Recovery Manager prior to 5.5.1.3
   vCenter Site Recovery Manager prior to 5.1.2.2
   vCenter Support Assistant without patch
   vCloud Application Director 5.x, 6.x without patch
   vCloud Automation Center 6.x without patch
   vCloud Automation Center Application Services 6.x without patch
   vCloud Director Appliance prior to 5.5.1.3
   vCloud Connector prior to 2.6.1
   vCloud Networking and Security prior to 5.5.3.1
   vCloud Networking and Security prior to 5.1.4.3
   vCloud Usage Meter prior to 3.3.2
   vFabric Postgres prior to 9.3.5.1
   vFabric Postgres prior to 9.2.9.1
   vFabric Postgres prior to 9.1.14.1
   VMware Application Dependency Planner prior to 2.0.0.1
   View Planner prior to 3.0.1.1
   VMware Data Recovery prior to 2.0.4
   VMware HealthAnalyzer prior to 5.0.3.1
   VMware Mirage Gateway prior to 5.1.1
   vSphere App HA prior to 1.1.1
   vSphere App HA 1.1.0 without patch
   vSphere Big Data Extensions 2.x without patch
   vSphere Data Protection 5.x without patch
   vSphere Management Assistant 5.5.x without 5.5 EP1
   vSphere Management Assistant 5.0.x without 5.0 EP1
   vSphere Replication prior to 5.8.0.1
   vSphere Replication prior to 5.6.0.2
   vSphere Replication prior to 5.5.1.3
   vSphere Replication prior to 5.1.2.2
   vSphere Storage Appliance prior to 5.5.2
   vSphere Storage Appliance 5.1.x without patch


3. Problem Description 

   a. Bash update for multiple products.

      Bash libraries have been updated in multiple products to resolve 
      multiple critical security issues, also referred to as Shellshock.
  
      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the identifiers CVE-2014-6271, CVE-2014-7169, 
      CVE-2014-7186, and CVE-2014-7187, CVE-2014-6277, CVE-2014-6278 
      to these issues.

      VMware products have been grouped into the following four
      product categories:
      
      I) ESXi and ESX Hypervisor
      ESXi is not affected because ESXi uses the Ash shell (through
      busybox), which is not affected by the vulnerability reported
      for the Bash shell.
      ESX has an affected version of the Bash shell. See table 1 for
      remediation for ESX.
    
      II) Windows-based products
      Windows-based products, including all versions of vCenter Server 
      running on Windows, are not affected.

      III) VMware (virtual) appliances
      VMware (virtual) appliances ship with an affected version of Bash. 
      See table 2 for remediation for appliances.
      
      IV) Products that run on Linux, Android, OSX or iOS (excluding 
      virtual appliances)

      Products that run on Linux, Android, OSX or iOS (excluding 
      virtual appliances) might use the Bash shell that is part of the
      operating system. If the operating system has a vulnerable
      version of Bash, the Bash security vulnerability might be
      exploited through the product. VMware recommends that customers
      contact their operating system vendor for a patch.    
      
      MITIGATIONS

      VMware encourages restricting access to appliances through
      firewall rules and other network layer controls to only trusted IP
      addresses. This measure will greatly reduce any risk to these
      appliances.

      RECOMMENDATIONS

      VMware recommends customers evaluate and deploy patches for
      affected products in Table 1 and 2 below as these
      patches become available. 

      Column 4 of the following tables lists the action required to
      remediate the vulnerability in each release, if a solution is
      available.

      Table 1 - ESXi and ESX Hypervisor
      =================================

      VMware           Product    Running  Replace with/
      Product          Version    on       Apply Patch 
      ==============   =======    =======  =============
      ESXi             any        ESXi     Not affected

      ESX              4.1        ESX      ESX410-201410401-SG*
      ESX              4.0        ESX      ESX400-201410401-SG*

      * VMware has made VMware ESX 4.0 and 4.1 security patches available 
      for the Bash shell vulnerability. This security patch release is an 
      exception to the existing VMware lifecycle policy.  

      Table 2 - Products that are shipped as a (virtual) appliance. 
      =============================================================

      VMware                           Product   Running  Replace with/
      Product                          Version   on       Apply Patch 
      ==============                   =======   =======  ================
      
      vCenter Server Appliance         5.x       Linux    5.5 U2a, 5.1 U2b,
                                                          5.0 U3b
      Horizon DaaS Platform            5.x, 6.x  Linux    6.1.1, 6.0.2, 
                                                          5.4.3
      Horizon Workspace                1.x, 2.x  Linux    See Section 4
      IT Business Management Suite     1.x       Linux    1.1.0, 1.0.1
      NSX for Multi-Hypervisor         4.x       Linux    4.2.1, 4.1.4
                                                          4.0.5
      NSX for vSphere                  6.x       Linux    6.1.1, 6.0.7
      NVP                              3.x       Linux    3.2.4
      vCenter Converter Standalone     5.x       Linux    Patch Pending**
      vCenter Hyperic Server*          5.x       Linux    5.8.3, 5.8.2-SP3,
                                                          5.8.1-SP3,
5.8.0-SP2, 
                                                          5.7.2, 5.7.1-SP1,
                                                          5.0.3, 5.0.2-SP1
      vCenter Infrastructure Navigator 2.x, 5.x  Linux    5.8.3, 5.7.1, 
                                                          2.0.1
      vCenter Log Insight              1.x, 2.x  Linux    2.0 U1, 1.5.0U1
      vCenter Operations Manager       5.x       Linux    See Section 4
      vCenter Orchestrator Appliance*  4.x, 5.x  Linux    5.5.2.1, 5.1.2, 
                                                          4.2.3 See Section
4
      vCenter Site Recovery Manager    5.x       Linux    5.5.1.3, 5.1.2.2,
                                                          5.0.x**
      vCenter Support Assistant        5.x       Linux    See Section 4
      vCloud Application Director      5.x, 6.x  Linux    See Section 4
      vCloud Automation Center         6.x       Linux    See Section 4
      vCloud Automation Center
      Application Services             6.x       Linux    See Section 4
      vCloud Director Appliance        5.x       Linux    5.5.1.3
      vCloud Connector                 2.x       Linux    2.6.1
      vCloud Networking and Security   5.x       Linux    5.5.3.1, 5.1.4.3
      vCloud Usage Meter               3.x       Linux    3.3.2
      vFabric Postgres                 9.x       Linux    9.3.5.1, 9.2.9.1,
                                                          9.1.14.1
      View Planner                     3.x       Linux    3.0.1.1
      VMware Application Dependency    x.x       Linux    2.0.0.1
      Planner                          
      VMware Data Recovery             2.x       Linux    2.0.4
      VMware HealthAnalyzer            5.x       Linux    5.0.3.1
      VMware Mirage Gateway            5.x       Linux    5.1.1
      VMware Socialcast On Premise     2.x       Linux    Patch Pending
      VMware Studio                    2.x       Linux    Patch Pending
      VMware Workbench                 3.x       Linux    Patch Pending
      vSphere App HA*                  1.x       Linux    1.1.1
      vSphere Big Data Extensions      2.x       Linux    See Section 4
      vSphere Data Protection          5.x       Linux    See Section 4
      vSphere Management Assistant     5.x       Linux    5.5 EP1, 5.0 EP1
      vSphere Replication              5.x       Linux    5.8.0.1, 5.6.0.2,
                                                          5.5.1.3, 5.1.2.2
      vSphere Storage Appliance*       5.x       Linux    5.5.2, 5.1.3
                                                          See Section 4

   * This product has patches available to update bash manually as well as
a full 
   installation that includes the bash fix for some versions. Either
installing 
   the patch or upgrading the appliance will remediate the "shellshock" 
   vulnerability. See documentation in Section 4 for details.

   ** This product includes Virtual Appliances that will be updated, the
product 
   itself is not a Virtual Appliance.

   4. Solution

   ESX
   ---
   Downloads:
   https://www.vmware.com/patchmgr/findPatch.portal
   Documentation:
   http://kb.vmware.com/kb/2090859
   http://kb.vmware.com/kb/2090853

   vCenter Server Appliance
   ------------------------
   Downloads:
  
https://my.vmware.com/web/vmware/details?productId=353&downloadGroup=VC55U2
   (scroll down to 5.5 Update 2a Appliance)
  
https://my.vmware.com/web/vmware/details?productId=285&downloadGroup=VCL-VS
P510-VC-51U2A
   (scroll down to 5.1 Update 2b Appliance)
  
https://my.vmware.com/web/vmware/details?productId=229&downloadGroup=VC50U3
A
   (scroll down to 5.0 Update 3b Appliance)
   Documentation:
   http://kb.vmware.com/kb/2091085
   http://kb.vmware.com/kb/2091018
   http://kb.vmware.com/kb/2091017

   Horizon DaaS Platform
   ---------------------
   Downloads:
  
https://my.vmware.com/web/vmware/details?productId=405&rPId=6527&downloadGr
oup=HORIZON-DAAS-610-BIN
  
https://my.vmware.com/web/vmware/details?productId=405&downloadGroup=HORIZO
N-DAAS-602
  
https://my.vmware.com/web/vmware/details?downloadGroup=HORIZON-DAAS-ONPREM-
540&productId=398
   Documentation:
   http://kb.vmware.com/kb/2091183

   Horizon Workspace
   -----------------
   Downloads:
   (Scroll down to the relevant download)
   Workspace Portal 2.1.0 ->
https://my.vmware.com/web/vmware/details?productId=419&rPId=6533&downloadGr
oup=HZNP210
   Workspace Portal 2.0.0 ->
https://my.vmware.com/web/vmware/details?productId=419&rPId=6533&downloadGr
oup=HZNWS200
   Horizon Workspace 1.8.2 ->
https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr
oup=HZNWS182
   Horizon Workspace 1.8.1 ->
https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr
oup=HZNWS181
   Horizon Workspace 1.8.0 ->
https://my.vmware.com/web/vmware/details?productId=399&rPId=6083&downloadGr
oup=HZNWS180
   Horizon Workspace 1.5.2 ->
https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr
oup=HZNWS152
   Horizon Workspace 1.5.1 ->
https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr
oup=HZNWS151
   Horizon Workspace 1.5.0 ->
https://my.vmware.com/web/vmware/details?productId=350&rPId=4768&downloadGr
oup=HZNWS150
   Documentation:
   http://kb.vmware.com/kb/2091067

   IT Business Management Suite
   ----------------------------
   Downloads:
  
https://my.vmware.com/web/vmware/details?downloadGroup=ITBM-STD-110&product
Id=384&rPId=6384
  
https://my.vmware.com/web/vmware/details?downloadGroup=ITBM-STD-101&product
Id=385&rPId=6333
   Documentation:
   http://kb.vmware.com/kb/2091014
   http://kb.vmware.com/kb/2091013

   NSX for Multi-Hypervisor
   ------------------------
   Downloads:
   https://my.vmware.com/group/vmware/get-download?downloadGroup=NSX-MH-421
   https://my.vmware.com/group/vmware/get-download?downloadGroup=NSX-MH-414
   Note: For 4.0.5 refer to http://www.vmware.com/products/nsx
   Documentation:
   http://kb.vmware.com/kb/2091179
   http://kb.vmware.com/kb/2091205


   NSX for vSphere
   ---------------
   Downloads:
   https://my.vmware.com/group/vmware/get-download?downloadGroup=NSX-V-611
   https://my.vmware.com/group/vmware/get-download?downloadGroup=NSX-V-607 
 
   Documentation:
   http://kb.vmware.com/kb/2091213
   http://kb.vmware.com/kb/2091216

   NVP
   ---
   Downloads and Documentation:
   http://www.vmware.com/products/nsx

   vCenter Hyperic Server
   ----------------------
   Downloads:
  
https://my.vmware.com/web/vmware/get-download?downloadGroup=VCHQ_583_AGENT
  
https://my.vmware.com/web/vmware/get-download?downloadGroup=VCHQ_583_SERVER
  
https://my.vmware.com/web/vmware/details?productId=378&rPId=6386&downloadGr
oup=VCHQ_582_SERVER
  
https://my.vmware.com/web/vmware/details?productId=378&rPId=6386&downloadGr
oup=VCHQ_581_SERVER
  
https://my.vmware.com/web/vmware/details?productId=378&rPId=6386&downloadGr
oup=VCHQ_580_SERVER
  
https://my.vmware.com/web/vmware/get-download?downloadGroup=VFHQ_572_AGENT
   https://my.vmware.com/web/vmware/get-download?downloadGroup=VFHQ_572
  
https://my.vmware.com/web/vmware/details?productId=346&rPId=6849&downloadGr
oup=VFHQ_571
  
https://my.vmware.com/web/vmware/get-download?downloadGroup=VFHQ_503_AGENT
  
https://my.vmware.com/web/vmware/get-download?downloadGroup=VFHQ_503_SERVER
  
https://my.vmware.com/web/vmware/details?productId=311&rPId=6848&downloadGr
oup=VFHQ_502
   Documentation:
   http://kb.vmware.com/kb/2091109
   http://kb.vmware.com/kb/2091210
   http://kb.vmware.com/kb/2091372
   http://kb.vmware.com/kb/2091373
   http://kb.vmware.com/kb/2091206
   http://kb.vmware.com/kb/2091223
   http://kb.vmware.com/kb/2091207
   http://kb.vmware.com/kb/2091224

   vCenter Infrastructure Navigator
   --------------------------------
   Downloads:
   https://my.vmware.com/web/vmware/get-download?downloadGroup=VIN_583
   https://my.vmware.com/web/vmware/get-download?downloadGroup=VIN_571
   https://my.vmware.com/web/vmware/get-download?downloadGroup=VIN_201
   Documentation:
   http://kb.vmware.com/kb/2091095
   http://kb.vmware.com/kb/2091093
   http://kb.vmware.com/kb/2091108

   vCenter Log Insight
   -------------------
   Downloads:
  
https://my.vmware.com/web/vmware/details?downloadGroup=STRATA20&productId=4
12&rPId=5804
  
https://my.vmware.com/group/vmware/details?downloadGroup=STRATA15&productId
=386&rPId=4787
   Documentation:
   http://kb.vmware.com/kb/2091065
   http://kb.vmware.com/kb/2091065

   vCenter Operations Manager
   --------------------------
   Downloads:
  
https://my.vmware.com/web/vmware/get-download?downloadGroup=VCOPS-583-STD
  
https://my.vmware.com/web/vmware/get-download?downloadGroup=VCOPS-573-STD
   Documentation:
   http://kb.vmware.com/kb/2091083
   http://kb.vmware.com/kb/2091002

   vCenter Orchestrator Appliance
   ------------------------------
   Downloads:
  
https://my.vmware.com/web/vmware/details?downloadGroup=VCL_VCOVA_5521&produ
ctId=353&rPId=6655
   Documentation:
   http://kb.vmware.com/kb/2091036

   vCenter Site Recovery Manager
   -----------------------------
   Downloads:
  
https://my.vmware.com/web/vmware/details?downloadGroup=SRM5513&productId=35
7&rPId=6636
  
https://my.vmware.com/web/vmware/details?downloadGroup=SRM5122&productId=29
1&rPId=6631
   Documentation:
   http://kb.vmware.com/kb/2091038
   http://kb.vmware.com/kb/2091039
   http://kb.vmware.com/kb/2091037 (5.0.x)

   vCenter Support Assistant
   -------------------------
   Downloads and Documentation:
   http://kb.vmware.com/kb/2091112

   vCloud Application Director
   ---------------------------
   Downloads:
  
https://my.vmware.com/web/vmware/details?downloadGroup=APPDIR_601_GA&produc
tId=383&rPId=6216
  
https://my.vmware.com/web/vmware/details?downloadGroup=VFAPPDIR_520_GA&prod
uctId=345&rPId=3789
   Documentation:
   http://kb.vmware.com/kb/2091129

   vCloud Automation Center
   ------------------------
   Downloads:
  
https://my.vmware.com/web/vmware/details?downloadGroup=VCAC-610&productId=4
47&rPId=6501
  
https://my.vmware.com/web/vmware/details?downloadGroup=VCAC-6012&productId=
383&rPId=6216
   Documentation:
   http://kb.vmware.com/kb/2091012

   vCloud Automation Center Application Services
   ---------------------------------------------
   Downloads:
  
https://my.vmware.com/web/vmware/details?downloadGroup=APPSER_610&productId
=447&rPId=6501
   Documentation:
   http://kb.vmware.com/kb/2091129

   vCloud Director Appliance
   -------------------------
   Downloads:
   www.vmware.com/go/try-vcloud-director
   Documentation:
   http://kb.vmware.com/kb/2091071

   vCloud Connector
   ----------------
   Downloads:
   https://my.vmware.com/web/vmware/get-download?downloadGroup=VCC261-GA
   Documentation:
   http://kb.vmware.com/kb/2091045

   vCloud Networking and Security
   ------------------------------
   Downloads:
   https://my.vmware.com/group/vmware/get-download?downloadGroup=VCNS5531
   https://my.vmware.com/group/vmware/get-download?downloadGroup=VCNS5143
   Documentation:
   http://kb.vmware.com/kb/2091218
   http://kb.vmware.com/kb/2091217

   vCloud Usage Meter
   ------------------
   Downloads:
   https://my.vmware.com/web/vmware/get-download?downloadGroup=UMSV332
   Documentation:
   http://kb.vmware.com/kb/2091184

   vFabric Postgres
   ----------------
   Downloads:
  
https://my.vmware.com/web/vmware/info/slug/application_platform/vmware_vfab
ric_postgres/9_3
  
https://my.vmware.com/web/vmware/info?slug=application_platform/vmware_vfab
ric_postgres/9_2
  
https://my.vmware.com/web/vmware/info?slug=application_platform/vmware_vfab
ric_postgres/9_1
   Documentation:
   http://kb.vmware.com/kb/2091055

   View Planner
   ------------
   View Planner Benchmark Mode

   Downloads:
  
https://my.vmware.com/web/vmware/details?productId=320&downloadGroup=VIEW-P
LAN-300
   Documentation:
   http://kb.vmware.com/kb/2091281

   View Planner Flexible Mode

   Downloads and Documentation:
   https://na6.salesforce.com/06980000001EUza

   VMware Application Dependency Planner
   -------------------------------------
   Downloads and Documentation:
   https://na6.salesforce.com/06980000001EUzQ

   VMware Data Recovery
   --------------------
   Downloads:
  
https://my.vmware.com/web/vmware/details?productId=229&downloadGroup=VDR204
   Documentation:
   http://kb.vmware.com/kb/2091015

   VMware HealthAnalyzer
   ---------------------
   Downloads and Documentation:
   https://na6.salesforce.com/06980000001EUzV

   VMware Mirage Gateway
   ---------------------
   Downloads:
  
https://my.vmware.com/web/vmware/details?downloadGroup=MIRAGE-510&productId
=407&rPId=6565
   (See VMware Mirage Gateway Software)
   Documentation:
   http://kb.vmware.com/kb/2091090

   vSphere App HA
   --------------
   Downloads:
   https://my.vmware.com/web/vmware/get-download?downloadGroup=APPHA-111
  
https://my.vmware.com/web/vmware/details?downloadGroup=APPHA-110&productId=
408&rPId=5635
   Documentation:
   http://kb.vmware.com/kb/2091087
   http://kb.vmware.com/kb/2091371

   vSphere Big Data Extensions
   ---------------------------
   Downloads:
  
https://my.vmware.com/group/vmware/details?downloadGroup=BDE_200_GA&product
Id=353&rPId=6657
   Documentation and Release Notes:
   http://kb.vmware.com/kb/2091050
  
https://www.vmware.com/support/bigdataextensions/doc/vsphere-big-data-exten
sions-20-release-notes.html#resolvedissues
  
https://www.vmware.com/support/bigdataextensions/doc/vsphere-big-data-exten
sions-11-release-notes.html#resolvedissues
  
https://www.vmware.com/support/bigdataextensions/doc/vsphere-big-data-exten
sions-10-release-notes.html#resolvedissues

   vSphere Data Protection
   -----------------------
   Downloads:
  
https://my.vmware.com/web/vmware/details?downloadGroup=VDP58_0&productId=35
3&rPId=6654
  
https://my.vmware.com/web/vmware/details?productId=353&rPId=6654&downloadGr
oup=VDP55_6
   Documentation:
   http://kb.vmware.com/kb/2091341

   vSphere Management Assistant
   ----------------------------
   Downloads:
   Download available via online vMA update mechanism
   Documentation:
   http://kb.vmware.com/kb/2079150
   http://kb.vmware.com/kb/2079151

   vSphere Replication
   -------------------
   Downloads:
  
https://my.vmware.com/web/vmware/details?downloadGroup=VR5801&productId=353
&rPId=6654
   https://my.vmware.com/web/vmware/get-download?downloadGroup=VR5602
  
https://my.vmware.com/web/vmware/details?productId=353&rPId=5721&downloadGr
oup=VR5513
  
https://my.vmware.com/web/vmware/details?downloadGroup=VR5122&productId=285
&rPId=6779
   Documentation:
   http://kb.vmware.com/kb/2091019
   http://kb.vmware.com/kb/2091031
   http://kb.vmware.com/kb/2091033
   http://kb.vmware.com/kb/2091035

   vSphere Storage Appliance
   -------------------------
   Downloads:
  
https://my.vmware.com/web/vmware/details?downloadGroup=VSP55-VSA-552&produc
tId=354&rPId=6585
  
https://my.vmware.com/web/vmware/details?downloadGroup=VSP51-VSA-513&produc
tId=297&rPId=3752
   Documentation:
   http://kb.vmware.com/kb/2091000
   http://kb.vmware.com/kb/2091086

5. References
   
   VMware Knowledge Base Article 2090740
   http://kb.vmware.com/kb/2090740

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271        , 
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278

- ------------------------------------------------------------------------

6. Change Log

   2014-09-30 VMSA-2014-0010
   Initial security advisory in conjunction with the release of
   vCenter Log Insight 2.0 U1 on 2014-09-30.

   2014-10-01 VMSA-2014-0010.1
   Updated advisory in conjunction with the release of ESX 4.x patches, 
   vCenter Server Appliance 5.5 U2a, 5.1 U2b, and 5.0 U3b, vCloud Director 
   Appliance 5.5.1.3, VMware Data Recovery 2.0.4, VMware Mirage Gateway 
   5.1.1 and vSphere Storage Appliance 5.5.2 on 2014-10-01. Added 
   CVE-2014-6277 and CVE-2014-6278 as they have been confirmed to be 
   mitigated.

   2014-10-01 VMSA-2014-0010.2
   Updated advisory in conjunction with the release of Horizon Workspace 
   patches, IT Business Management Suite 1.1.0 and 1.0.1, vCenter 
   Operations Manager patches, vCenter Site Recovery Manager 5.5.1.3 and 
   5.1.2.2, vCloud Application Director patches, vCloud Automation Center 
   patches, vCloud Automation Center Application Services patches, vCloud 
   Director Appliance 5.5.1.3, vFabric Postgres 9.3.5.1, 9.2.9.1, and 
   9.1.14.1, vSphere Replication 5.8.0.1, 5.5.1.3, and 5.1.2.2 on 
   2014-10-01.

   2014-10-02 VMSA-2014-0010.3
   Updated advisory in conjunction with the release of vCenter Hyperic 
   Server 5.8.3, 5.7.2, and 5.0.3, vCenter Infrastructure Navigator 5.8.3,
   5.7.1, and 2.0.1 vCenter Orchestrator Appliance patches, vCenter Support
   Assistant patches, vSphere App HA 1.1.1, vSphere Management Assistant 
   5.5 EP1 and 5.0 EP1 and vSphere Storage Appliance patches on 2014-10-02.

   2014-10-02 VMSA-2014-0010.4
   Updated advisory in conjunction with the release of Horizon DaaS 
   Platform 6.1.1, 6.0.2, and 5.4.3, vCenter Orchestrator Appliance
5.5.2.1,
   vCloud Connector 2.6.1, vCloud Usage Meter 3.3.2, and vSphere 
   Replication 5.6.0.2 on 2014-10-02.

   2014-10-03 VMSA-2014-0010.5
   Updated advisory in conjunction with the release of vCloud Networking 
   and Security 5.5.3.1 and 5.1.4.3 on 2014-10-03.

   2014-10-04 VMSA-2014-0010.6
   Updated advisory in conjunction with the release of NSX for 
   Multi-Hypervisor 4.2.1, 4.1.4, and 4.0.5, NSX for vSphere 6.1.1 and
6.0.7,
   NVP 3.2.4, and vSphere Big Data Extensions 2.x patch on 2014-10-04.

   2014-10-05 VMSA-2014-0010.7
   Updated advisory in conjunction with the release of View Planner
Benchmark 
   3.0.1.1 and vSphere Data Protection 5.x patch on 2014-10-05.

   2014-10-06 VMSA-2014-0010.8
   Updated advisory in conjunction with the release of vCenter Hyperic
Server 
   5.8.2 SP3, 5.8.1 SP3, 5.8.0 SP2, 5.7.1 SP1, and 5.0.2 SP1, vCenter Log 
   Insight 1.5.0U1, View Planner Flexible 3.0.1.1,VMware Application
Dependency 
   Planner 2.0.0.1, VMware HealthAnalyzer 5.0.3.1, vSphere App HA 1.1.0
patch 
   on 2014-10-06.

- ------------------------------------------------------------------------

 
7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

    security-announce at lists.vmware.com
    bugtraq at securityfocus.com
    fulldisclosure at seclists.org

   E-mail: security at vmware.com
   PGP key at: http://kb.vmware.com/kb/1055

   VMware Security Advisories
   http://www.vmware.com/security/advisories

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Policy
   https://www.vmware.com/support/policies/lifecycle.html
 
   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2014 VMware Inc.  All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.2 (Build 15337)
Charset: utf-8

wj8DBQFUMxZ4DEcm8Vbi9kMRAurPAJ9Grayh6jV8aaAQ/oUB92eF2UmJKgCgh9td
9QOr9abWJHNuF+qn1gWiXJE=
=EOGQ
-----END PGP SIGNATURE-----

Software and Security Information